Search for dissertations about: "iot and security"

Showing result 11 - 15 of 47 swedish dissertations containing the words iot and security.

  1. 11. Lightweight Security Solutions for the Internet of Things

    Author : Shahid Raza; Mats Björkman; Wen Hu; Mälardalens högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Security; Internet of Things; 6LoWPAN; CoAP; RPL; Secure Storage; IDS; DTLS; IPsec; Computer Science; datavetenskap;

    Abstract : The future Internet will be an IPv6 network interconnecting traditional computers and a large number of smart object or networks such as Wireless Sensor Networks (WSNs). This Internet of Things (IoT) will be the foundation of many services and our daily life will depend on its availability and reliable operations. READ MORE

  2. 12. Parallel and Distributed Processing in the Context of Fog Computing: High Throughput Pattern Matching and Distributed Monitoring

    Author : Charalampos Stylianopoulos; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; resource-constrained devices; distributed monitoring; distributed processing; vectorization; pattern matching; high throughput; fog computing;

    Abstract : With the introduction of the Internet of Things (IoT), physical objects now have cyber counterparts that create and communicate data. Extracting valuable information from that data requires timely and accurate processing, which calls for more efficient, distributed approaches. READ MORE

  3. 13. Generating Optimized and Secure Binary Code

    Author : Rodothea Myrsini Tsoupidi; Elena Troubitsyna; Panagiotis Papadimitratos; Fernando Magno Quintão Pereira; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; constraint programming; code optimization; secure compilation; side-channel attacks; code-reuse attacks; software security; villkorsprogrammering; kodoptimering; säker kompilering; sidokanalsattacker; kodåteranvändningsattacker; mjukvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : The increased digitalization of modern societies has resulted in a proliferation of a broad spectrum of embedded devices, ranging from personal smartphones and heart pacemakers to large-scale industrial IoT systems. Since they often handle various sensitive data, these devices increasingly become the targets of cyberattacks that threaten the integrity of personal data, financial security, and sometimes even people’s safety. READ MORE

  4. 14. A Principled Approach to Securing IoT Apps

    Author : Iulia Bastys; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; information flow control; design principles; IoT apps; Internet of Things;

    Abstract : IoT apps are becoming increasingly popular as they allow users to manage their digital lives by connecting otherwise unconnected devices and services: cyberphysical “things” such as smart homes, cars, or fitness armbands, to online services such as Google or Dropbox, to social networks such as Facebook or Twitter. IoT apps rely on end-user programming, such that anyone with an active account on the platform can create and publish apps, with the majority of apps being created by third parties. READ MORE

  5. 15. Communication With Reconstruction and Privacy Constraints

    Author : Kittipong Kittichokechai; Mikael Skoglund; Tobias J. Oechtering; Sennur Ulukus; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; source coding; channel coding; information privacy; physical layer security; action; side information; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Communication networks are an integral part of the Internet of Things (IoT) era. They enable endless opportunities for connectivity in a wide range of applications, leading to advances in efficiency of day-to-day life. While creating opportunities, they also incur several new challenges. READ MORE